Smead

Organization
Mentions
52
Relationships
0
Events
0
Documents
26
Also known as:
Smead - Manufacturer of the file folder

Relationship Network

Loading... nodes
Interactive Network: Click nodes or edges to highlight connections and view details with action buttons. Drag nodes to reposition. Node size indicates connection count. Line color shows relationship strength: red (8-10), orange (6-7), yellow (4-5), gray (weak). Use legend and help buttons in the graph for more guidance.
No relationships found for this entity.
No events found for this entity.

EFTA00008508.pdf

A photograph of a cardboard evidence box. The box is marked with the handwritten case identifier '31E-NY-3027571-1B27' and '1B27', suggesting it is part of an FBI investigation (likely New York field office). The shipping label is redacted.

Evidence photograph / physical evidence container
2025-12-25

EFTA00008478.pdf

A photograph showing two yellow padded evidence envelopes resting on a Smead file folder. The visible label on the left envelope identifies the contents as 'HQQ019336', which is a 'Clone of HQQ019334 - Bay 2 of Main Controller'. This indicates the envelopes contain digital forensic copies of hard drives seized from a main controller system (likely surveillance or server infrastructure). The Lab ID HQ0190816001 suggests the evidence was processed on August 16, 2019.

Photograph of physical evidence (forensic hard drive clones)
2025-12-25

EFTA00008476.pdf

A photograph of a computer hard drive sealed in a pink anti-static evidence bag, resting on a brown Smead file folder. The hard drive has a label attached that reads 'DVR 2 ARRAY CONTROLLER' and 'TOP BAY CLONE' in red text, suggesting it is a forensic copy of surveillance footage data. The document is marked with the Bates number EFTA00008476.

Photograph of physical evidence (hard drive)
2025-12-25

EFTA00008474.pdf

This image shows two LTO-6 magnetic tape cartridges labeled as FBI evidence (Item 1B 53, Case 90A-NY-3151227). The labels indicate the tapes contain a 'Master Copy' of a CART Network archive of video images taken from MCC-NY (Metropolitan Correctional Center New York) video recorder hard drives as of June 21, 2021. The tapes are dated July 23, 2021, and sit atop an FBI Chain of Custody form (FD-1004).

Photograph of physical evidence (lto tapes)
2025-12-25

EFTA00008472.pdf

This document is a photograph of a physical piece of evidence: a Western Digital hard drive sealed in an anti-static bag. An FBI evidence label attached to the drive identifies it as 'Specimen HQQ026639' related to case 'UCFN: 90A-NY-3151227' (the code 90A typically relates to child exploitation matters). The label describes the contents as a 'Master Copy' containing archives of 'DVR 2 Controller images,' 'repaired drive images,' and 'Video Exports,' suggesting this drive contains recovered surveillance footage relevant to the investigation. The Lab number HQQ190816001 indicates the evidence was processed on August 16, 2019.

Physical evidence photograph (hard drive)
2025-12-25

EFTA00008470.pdf

This document is a photograph of a 10TB Seagate IronWolf hard drive packaged in an evidence bag. The drive bears a label identifying its contents as a 'Master Copy: Archive of DVR 1 Images', suggesting it contains surveillance footage relevant to the investigation. The label includes FBI-style case identifiers: Lab # HQQ190816001 (indicating a date of August 16, 2019, shortly after Jeffrey Epstein's death) and UCFN 90A-NY-3151227 (indicating an Obscene Matter case out of the New York office). The drive itself was manufactured in November 2018.

Photograph of physical evidence (hard drive)
2025-12-25

EFTA00008468.pdf

This document is a photograph of an evidence bag containing a 2.0TB Western Digital hard drive. The label identifies the contents as a 'Master Copy: Archive of DVR Main Controller Images,' suggesting it contains security camera footage. The evidence label bears the case file number '90A-NY-3151227' (an FBI code for a matter involving a minor in New York) and a Lab number 'HQQ190816001', indicating the evidence was processed on or around August 16, 2019.

Photograph of physical evidence (hard drive)
2025-12-25

EFTA00008464.pdf

This image is a photograph of physical evidence consisting of a computer hard drive sealed inside a pink anti-static protective bag. The bagged drive is resting on a brown Smead file folder (Model No. 1056EL). The image is stamped with the evidence identifier EFTA00008464. No specific data, dates, or names are legible on the hard drive itself due to the packaging and image quality.

Photograph of physical evidence
2025-12-25

EFTA00008460.pdf

A photograph showing a piece of physical evidence, likely digital media (hard drive or disk), sealed in a plastic evidence bag. The bag is handwritten with 'SDA - NY - 3151227' and '2B46'. Inside, a label visible through the plastic reads 'NY-BACKUP' with a file path pointing to a server '\\NYCART-FS\CASES02' and a timestamp of November 18, 2019, suggesting this is a forensic backup of digital evidence processed after the initial investigation timeline.

Photograph of evidence (digital media backup)
2025-12-25

EFTA00008458.pdf

A photograph showing a Seagate hard drive sealed inside a clear anti-static evidence bag. The drive bears a label reading 'BAY 14 CLONE' and 'PIM 08004', suggesting it is a forensic copy or evidence item. The item is resting on a Smead file folder and marked with the Bates number EFTA00008458.

Photograph of physical evidence (hard drive)
2025-12-25

EFTA00008456.pdf

This document is a photograph of physical evidence, specifically a Seagate hard drive sealed inside a pink anti-static evidence bag. The bag is resting on a brown Smead file folder. Handwritten initials or markings are visible on the plastic bag in black marker. The image bears the Bates stamp EFTA00008456.

Photograph of physical evidence
2025-12-25

EFTA00008454.pdf

This image depicts a piece of physical evidence: a Seagate Barracuda 7200.10 500GB hard drive sealed in an anti-static bag. The drive has a piece of blue painter's tape on it with handwritten text reading 'Helen' followed by an illegible word and the date '9/19/06'. The evidence is marked with the Bates stamp EFTA00008454.

Evidence photo (physical evidence)
2025-12-25

EFTA00008448.pdf

This document is a photograph of a sealed evidence bag containing a Seagate Barracuda 1000GB hard drive (Evidence ID 1B30). The yellow label indicates this drive is a forensic 'Derivative Copy' or clone of another hard drive (Evidence ID 1B10, a Seagate Barracuda 500GB), created on August 12, 2019, by an individual with initials PC in connection with case 90A-NY-3151227.

Physical evidence photograph / forensic evidence label
2025-12-25

EFTA00008444.pdf

This is a photograph of an evidence bag containing a Seagate Barracuda 1000GB hard drive (Item 1B24). The label indicates it is a forensic 'Derivative Copy' (clone) of another hard drive (Item 1B3, a 500GB Seagate) created on August 12, 2019, in connection with case 90A-NY-3151227.

Photograph of physical evidence (hard drive)
2025-12-25

EFTA00008442.pdf

This document is a photograph of an evidence box labeled 'RX18' containing item 1B42. The green label identifies the contents as an FBI-owned Hitachi 2TB Hard Drive created on August 21, 2019. The drive is a 'Master Copy' containing verified forensic E01 images of other evidence items (1B12, 1B16, 1B17, and 1B18), associated with case number 90A-NY-3151227.

Evidence photograph / chain of custody label
2025-12-25

EFTA00008440.pdf

This document is a photograph of physical evidence, specifically a sealed anti-static bag containing a Seagate hard drive labeled as item 1B22. The label details a forensic operation performed on August 12, 2019, where a clone copy was made from a source hard drive (Item 1B1, 500GB) onto this destination drive (1000GB) using a Tableau TX-1 forensic imager. The case identifier 90A-NY-3151227 suggests an FBI investigation based in New York.

Physical evidence photograph / forensic hard drive label
2025-12-25

EFTA00008438.pdf

This document is a photograph of an evidence bag containing a hard drive. The label identifies the contents as item 1B33, a Western Digital 1TB hard drive containing a forensic clone of item 1B15, a Seagate Barracuda 500GB hard drive. The evidence was processed on August 12, 2019, in connection with case 90A-NY-3151227.

Evidence photograph / chain of custody label
2025-12-25

EFTA00008434.pdf

A photograph of an evidence bag containing a Hitachi 1TB hard drive. The label identifies this item (1B23) as a 'PC Derivative Copy' or forensic clone of another hard drive (item 1B2, a Hitachi 500GB drive) related to case 90A-NY-3151227. The cloning process took place on August 12, 2019, using a Tableau TX-1 forensic imager.

Physical evidence photograph / forensic evidence label
2025-12-25

EFTA00008432.pdf

A photograph of physical evidence consisting of a Seagate 1000GB Desktop Hard Drive inside an anti-static bag. The drive bears an official label from the 'New York CART Lab' (FBI Computer Analysis Response Team) with the identifier 'N: 6327:08' and references a 'DVR 2 DISK ARRAY'. A handwritten label identifies this specific drive as 'Clone #9', suggesting it is a forensic copy of data from a digital video recorder system. The document bears the Bates number EFTA00008432.

Evidence photograph
2025-12-25

EFTA00008430.pdf

This is a photograph of a physical piece of evidence: a 1000GB Seagate Barracuda hard drive sealed in a pink anti-static evidence bag. The drive is marked with a handwritten label 'Clone # 11' and a printed label 'DVR 2 DISK ARRAY', suggesting it contains cloned data from a digital video recorder (surveillance system). It bears a 'New York CART Lab' asset tag with the ID 'NYC027740'.

Photograph of physical evidence (hard drive)
2025-12-25

EFTA00008428.pdf

This is a photograph of physical evidence, specifically a Seagate hard drive (labeled as a 4TB 2 Disk Array) contained within a sealed anti-static bag. The drive bears a forensic label from the 'New York CART Lab' (Computer Analysis Response Team) and is handwritten with the identifier 'Clone #4'. The evidence is placed on top of a brown Smead file folder and has the Bates stamp EFTA00008428.

Physical evidence photograph
2025-12-25

EFTA00008423.pdf

A photograph of a piece of physical evidence: a Seagate Barracuda 1000GB hard drive encased in plastic packaging. The green label identifies it as evidence item 1B36 in case 90A-NY-3151227. It is described as a 'PC Derivative Copy' (forensic clone) created on 08/12/2019, containing the clone of another hard drive (item 1B18, a 500GB Seagate). The evidence tape is signed with initials 'TC' and dated 8/16/19.

Photograph of physical evidence (forensic hard drive clone)
2025-12-25

EFTA00008421.pdf

This document is a photograph of physical evidence, specifically a sealed Seagate 1TB hard drive (Item 1B35). The label indicates it is a forensic clone created on August 12, 2019, containing a copy of another hard drive (Item 1B17, a 500GB Seagate Constellation). The evidence was processed in connection with case 90A-NY-3151227.

Evidence photograph / forensic hard drive label
2025-12-25

EFTA00008417.pdf

This document is a photograph of a physical evidence bag containing a hard drive, labeled as Item 1B32. The label indicates that on August 12, 2019, a forensic clone ('derivative copy') was made from a 500GB Seagate hard drive (Item 1B12) onto a 1000GB Seagate hard drive (Item 1B32) using a Tableau TX-1 imager. The evidence is associated with case number 90A-NY-3151227.

Physical evidence photograph / chain of custody label
2025-12-25

EFTA00008415.pdf

This document is a photograph of physical evidence: a Seagate 500GB hard drive (S/N W2AEXSJV) sealed in a plastic container. The label indicates it contains a 'Master Copy' of video surveillance footage from the Metropolitan Correctional Center (MCC) downloaded from DVR1. The footage covers the Special Housing Unit (SHU) floor 9 and Attorney Visit area floor 3 from July 23, 2019, to August 10, 2019, the date of Jeffrey Epstein's death. The label notes a failed download for 8/9 and mentions a 'wrong camera' issue.

Evidence photograph / chain of custody label
2025-12-25
Total Received
$0.00
0 transactions
Total Paid
$0.00
0 transactions
Net Flow
$0.00
0 total transactions
No financial transactions found for this entity. Entity linking may need to be improved.
As Sender
0
As Recipient
0
Total
0
No communications found for this entity. Entity linking may need to be improved.

Discussion 0

Sign in to join the discussion

No comments yet

Be the first to share your thoughts on this epstein entity